strategy
Threat modeling needs a reset
Organizations need to rethink their approach to threat modeling or risk losing its value as a key defense in their cybersecurity arsenals. The traditional approaches to threat …
Chief Compliance Officers must embrace new leadership responsibilities
As demands on the compliance function grow more intense, Chief Compliance Officers (CCOs) must proactively embrace new leadership responsibilities for their role and …
Major threats to cloud infrastructure security include a lack of visibility and inadequate IAM
98% of companies had experienced at least one cloud data breach in the past 18 months compared to 79% last year, according to an IDC survey. Meanwhile, 67% reported three or …
How to conquer synthetic identity fraud
“No single organization can stop synthetic identity fraud on its own,” reports The Federal Reserve. “Fraudster tactics continually evolve to stay a step ahead of detection—and …
Digital transformation needs data integrity to be successful
The exponential growth of business data, coupled with advancements in cloud computing, AI, and the IoT has unleashed an era of digital transformation across the globe. This is …
Navigating the complexity of ransomware negotiations
Most ransomware attacks are opportunistic, and at the end of the day, cybercriminals do not discriminate. Nobody plans to fall victim, but the fact is any company with an …
Third-party identity risk management, compliance, or both?
Third-party risk management and compliance have traditionally gone hand-in-hand. One is a business requirement, the other a business necessity. So, which comes first? Or …
Combatting OpSec threats to our COVID-19 vaccination efforts: What can we do?
COVID-19 vaccines have been rolling out for a few months now, but the nature of the pandemic and the number of people impacted by it mean that demand for these vaccines is …
What is the impact of remote work on security best practices?
Employees are now accessing resources from any device and from anywhere outside of their corporate domain, a JumpCloud survey reveals. The report details the impact of …
SOC burnout is real: 3 preventative steps every CISO must take
Consider this scenario: Morgan, a level 3 security analyst, arrives to a twelve-hour security operations center (SOC) shift and finds a message that a network sensor is …
Shame culture is the biggest roadblock to increasing security posture
Cybersecurity culture is nearly impossible to quantify due to an absence of measurement tools. Many businesses attempt to quantify the human element of their security posture …
The paradox of post-quantum crypto preparedness
Preparing for post-quantum cryptography (PQC) is a paradox: on the one hand, we don’t know for sure when, or perhaps even if, a large quantum computer will become available …
Featured news
Resources
Don't miss
- Job-seeking devs targeted with fake CrowdStrike offer via email
- January 2025 Patch Tuesday forecast: Changes coming in cybersecurity guidance
- The SBI fake banking app shows that SMS authentication has had its day
- Preventing the next ransomware attack with help from AI
- Banshee Stealer variant targets Russian-speaking macOS users